Due to improper logic when performing these checks, it is possibleto bypass the security warning and execute the program. First of all,checking is performed using a case sensitive comparison. The secondflaw in this check is that the blacklist fails to mention all potentialexecutable file formats. By using at least one upper case character, orusing an executable file type that is not covered in the list, anattacker can bypass the security warning.